Skip to main content
Log in

A novel hyper-chaotic image encryption with sparse-representation based compression

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This digital era uses lots of images in communication, which are confidential and large in volume. The transmission channel thus arises the question of security as well as transmission load. To date, several works are there to solve this issue. However, they fail to provide a single unit that gives these two facilities in a unified way. This paper presents a novel technique of unification of image compression and encryption in a single module via sparse-representation of image frames and hyper-chaotic encryption techniques. In this work, we have proposed a method to estimates the sparse vectors of a given image using a regularized trained over-complete dictionary and encrypt the non-zero coefficients of the sparse vectors using key-streams generated by a hyper-chaotic system. This sparse coding based encryption technique provides a higher compression ratio (CR) compared to some recently proposed techniques on one side and increases security level on the other side. Moreover, the security is strengthened by using this key-sequence in different steps in the encryption scheme. Thus the compressed-encrypted outputs are stronger than simple chaotic encryption against any intruder. The efficiency and authenticity of the proposed algorithm are verified through several quality-index e.g. entropy, CR, etc. The resistivity of the proposed algorithm toward the known or chosen-plaintext attack is also analyzed. The results of the key sensitivity test, and cropping attack test also ensure the authors’ claim. The comparison of the proposed technique with some recently published works justifies the reliability of this work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. AES Algorithm. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf [Accessed on 12 March 2020].

  2. Aharon M, Elad M, Bruckstein (2006) K-SVD: an algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans Signal Processing 54:4311–4322

    Article  MATH  Google Scholar 

  3. Blake A, Isard M (2012) Active contours: the application of techniques from graphics vision, control theory and statistics to visual tracking of shapes in motion. Springer Science & Business Media, Berlin

    Google Scholar 

  4. Bruckstein AM, Donoho DL, Elad M (2009) From sparse solutions of systems of equations to sparse modelling of signals and images. SIAM Rev 51(1):34–81

    Article  MathSciNet  MATH  Google Scholar 

  5. Çavusoglu Ü, Akgül A, Kaçar S, Pehlivan I, Zengin A (2016) A novel chaos-based encryption algorithm over TCP data packet for secure communication. Security Comm Networks 9:1285–1296

    Article  Google Scholar 

  6. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Article  Google Scholar 

  7. Chan KS, Fekri F (2004) A block cipher cryptosystem using wavelet transforms over finite fields. IEEE Trans Signal Processing 52(10):2975–2991

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  9. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Transactions on Circuits and Systems—I: Fundamental Theory and Applications 48(12):1498–1509

    Article  MathSciNet  MATH  Google Scholar 

  10. DES Algorithm. (Available from: https://csrc.nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf) [Accessed on 12 March 2020].

  11. Guan, KY (2014) Important notes on lyapunov exponents.

  12. Hermassi H, Belazi A, Rhouma R, Belghith S M (2013). Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed tools Appl. 1–14

  13. https://github.com/jaishreedhage/JPEG-image-compression

  14. https://github.com/vibhuthasak/RC6-Algorithmn

  15. Kulsoom A, Xiao D, Rehman A, Abbas S (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 74(13):1–23

    Article  Google Scholar 

  16. Lee H, Battle A, Raina R, Ng AY (2006) Efficient sparse coding algorithms. Proceedings of NIPS’06, p 801–808

  17. Li C, Liu Y, Xie T, Chen MZQ (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn 73:2083–2089

    Article  MathSciNet  MATH  Google Scholar 

  18. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248

    Article  Google Scholar 

  19. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115

    Article  Google Scholar 

  20. Marinal J, Bach F, Ponce J, Sapiro G (2009) Online dictionary learning for sparse coding. International conference on machine learning (ICML ‘09). ACM, New York, NY, USA 689-696 DOI: https://doi.org/10.1145/1553374.1553463

  21. Memosa VA, Psannis KE, Ishibashi Y, Kimc BG, Gupta BB (2018) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT Smart City framework. Futur Gener Comput Syst 83:619–628

    Article  Google Scholar 

  22. Ning K (2010). A pseudo DNA cryptography method arXiv preprint arXiv: 0903.2693

  23. Osama S, Faragallah OA (2011) An efficient block encryption cipher based on chaotic maps for secure multimedia applications. Information Security Journal: A Global Perspective 20(3):135–147. https://doi.org/10.1080/19393555.2011.560926

    Article  Google Scholar 

  24. Pavan RL, Robshaw MJB, Sidney R, Yin YL. The RC6 block cipher. v1.1., (1998). (Available from: https://people.csail.mit.edu/rivest/pubs/RRSY98.pdf).

  25. Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG data collection–processing and analysis in smart buildings. Futur Gener Comput Syst 82:349–357

    Article  Google Scholar 

  26. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of Chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150

    Article  Google Scholar 

  27. Psannis KE, Ishibashi Y (2006) Impact of video coding on delay and jitter in 3Gwireless videoMulticast services. EURASIP Journal onWireless Communications and Networking 2006:1–7

    Google Scholar 

  28. Rivest RL (1995) The RC5 encryption algorithm, fast soft- ware encryption. Springer, Berlin Heidelberg

    MATH  Google Scholar 

  29. Setyaningsih E, Wardoyo R (2017) Review of image compression and encryption techniques. Int J Adv Comput Sci Appl 8(2):83–94

    Google Scholar 

  30. Stergiou C, Psannis KE (2017) Efficient and secure BIG data delivery in cloud computing. Multimed Tools Appl 76:22803–22822. https://doi.org/10.1007/s11042-017-4590-4

    Article  Google Scholar 

  31. Stergiou C, Psannis KE, Kimb BG, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78:964–975

    Article  Google Scholar 

  32. Stergiou C, Psannis KE, Plageras AP, Ishibashi Y, Kim BG (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System 5(1):27–34

    Google Scholar 

  33. Taheri AM, Nasab HM (2018) Sparse representation based facial image compression via multiple dictionaries and separated ROI. Multimed Tools Appl 77:31095–31114

    Article  Google Scholar 

  34. Tong XJ, Wang Z, Zhang M (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 77:229–241

    Article  MathSciNet  Google Scholar 

  35. Tong XJ, Zhang M, Wang Z (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn 84:2333–2356

    Article  Google Scholar 

  36. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  37. Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232

    Article  Google Scholar 

  38. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  39. Wu CP, Kuo JC (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839

    Article  Google Scholar 

  40. Yang J, Wright J, Huang TS, Ma Y (2010) Image super-resolution via sparse representation. IEEE Trans Image Processing 19(11):2861–2873

    Article  MathSciNet  MATH  Google Scholar 

  41. Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyper-chaotic and DNA sequences for image encryption. J Electron Imaging 26(1):1–11

    Article  Google Scholar 

  42. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  43. Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519

    Article  Google Scholar 

  44. Zhang Z, Xu Y, Yang J, Li X, Zhang D (2016) A survey of sparse representation: algorithms and applications. arXiv:1602.07017v1[cs.CV]

  45. Zhang X, Nie W, Ma Y, Tian Q (2017) Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 76:15641–15659

    Article  Google Scholar 

  46. Zhang G, Zhang F, Liao X, Lin D, Zhou P (2017) On the dynamics of new 4D Lorenz-type chaos systems. Advances in Difference Equations 217. https://doi.org/10.1186/s13662-017-1280-5

  47. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29–37

    Article  Google Scholar 

  48. Zhu H, Zhao C, Zhang X (2013) A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28:670–680

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Institute of Technology Durgapur, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M K Mandal.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karmakar, J., Nandi, D. & Mandal, M.K. A novel hyper-chaotic image encryption with sparse-representation based compression. Multimed Tools Appl 79, 28277–28300 (2020). https://doi.org/10.1007/s11042-020-09125-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09125-9

Keywords

Navigation